Normal keys could be on their way out as Near Field Communication technology could turn mobile into the future keys 
Keys could be a thing of the past as Near Field Communication technology enables mobile phones to be used as keys

Near Field Communications (NFC) technology is a catalyst that will hasten the use of mobile phones as mobile electronic keys for access control. Though the technology already exists, the necessary infrastructure and supporting devices still have some way to go. In this article, Rachel Sa of ASSA Abloy Future Labs evaluates the benefits and applications of mobile contactless credentials for access control.

Mobile phones have steadily offered users more tools and benefits than simply making and receiving calls. Today, our phones serve as calendars, cameras, mini computers and video game consoles. Thanks to Near Field Communications (NFC) technology, another valuable tool could be loaded onto your handset in the near future - your keys.

The wonders of Near Field Communications 

Mobile contactless credentials act as virtual keys or access control cards that can be stored in your mobile handset and used to lock and unlock doors. NFC (Near Field Communication) is the short-range high-frequency wireless communication technology that enables the exchange of information between electronic devices.

Existing contactless access control solutions

Contactless credentials already exist in various forms as relates to access control. Two common form factors are fobs or plastic access cards. These fobs and access cards can be programmed with contactless credentials that provide various levels of access to buildings, rooms and offices.

The strongest advantage, and one that is unique to mobile contactless credentials, is that the credential can be instantly delivered to a person's handset 

But mobile contactless credentials located within a handset boast benefits over existing contactless access control systems: Mobile contactless credentials simplify things for users by letting them fewer things, like fobs and cards. For security managers, they make it easier to keep more precise track of who is entering and exiting monitored access points.

Advantages and applications of mobile contactless credentials

Yet the strongest advantage, and one that is unique to mobile contactless credentials, is that the credential can be instantly delivered to a person's handset - no physical hand off is required.

"The most fundamental benefit of mobile contactless credentials for access control is that you can actually deliver the keys digitally because you will have universally secure elements in the mobile phone," says Daniel Berg, vice president and general manager Mobile Keys with ASSA ABLOY. "This has never been possible before. With existing contactless access control solutions, you must physically hand out plastic cards or fobs to the users to issue access rights. And to update the credentials, you need physical access to them again." So the phone becomes more than just a holder of the credential in the way cards and fobs hold an access credential. Rather, the phone can also receive the key digitally.

Mobile contactless credentials simplify things for users by letting them fewer things, like fobs and cards 
For security managers mobile credentials can make it easier to monitor access points

Such mobile contactless credentials have multiple potential applications such as in private residences, in commercial buildings for employees, and in travel situations for hotel guests.

In a travel situation, many hotels have already switched from traditional keys to electronic cards. But mobile contactless credentials would have the potential to streamline a guest's experience. With an NFC-enabled handset, mobile contactless credential and a system to deliver that contactless credential, a hotel guest could check in on their handset and receive access to their room - all without having to physically "check-in" with a hotel representative. Meanwhile, in a residential setting, a homeowner could send a mobile contactless credential to a contractor or housekeeper and specify the length of time that access credential would be active.

Enhanced trackability with centrally controlled access control

Where mobile contactless credentials are poised to have perhaps the greatest impact, however, is in commercial settings. With mobile contactless credentials, security managers could manage all users from a central access control system and instantly deliver credentials with the appropriate level of access to employees and visitors. While cards and fobs that are widely in use can also be deactivated in the event that they go missing or are stolen, the benefits of the mobile contactless credentials in a handset enable security managers to more precisely track the activities of personnel. So, if it becomes essential to know if a particular credential was used to gain access at a particular time, the mobile contactless credentials would support real-time traceability for both online and offline doors.

 mobile contactless credentials have multiple potential applications such as in private residences
Mobile contactless credentials have multiple potential applications such as in private residences 

But while the benefits of access control applications for mobile contactless credentials are plentiful, the technology to support those applications is not yet up and running. For example, while the technology for NFC handsets does exist, today very few models of NFC-enabled phones are available. The infrastructure to deliver mobile contactless credentials to handsets must also be launched.

 Mobile phone access control key - the future

"Mobile keys will happen sooner or later," Berg says. "That's just the trend we're seeing now with everything else that is going onto mobile phones. NFC is one catalyst for this application."

What is needed now is a full system that will deliver those contactless credentials from an access control system to an end user. "The technology is there," says Berg. "Now it is up to innovative companies to put all the pieces together."

 Rachel Sa of ASSA Abloy FUTURE LAB Rachel Sa
ASSA Abloy Future Lab 
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Are Privacy Concerns Stifling Innovation in Security?
Are Privacy Concerns Stifling Innovation in Security?

Facial recognition is the latest technology to be targeted because of concerns about privacy. If such concerns cloud the public perception, they can be harmful to technology markets. Whether the concerns are genuine or based on misinformation is often beside the point; the practical damage has already been done. But beyond market demand, what is the impact of privacy concerns on technology innovation? We asked this week’s Expert Panel Roundtable: Are privacy concerns stifling innovation in security and related markets? 

Building Security: How Audio Tells the Whole Story
Building Security: How Audio Tells the Whole Story

Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorized to enter?   Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or invite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds.  Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents.  Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous challenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open.  COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service.  The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.  

Inclusion and Diversity in the Security Industry: ‘One Step at a Time’
Inclusion and Diversity in the Security Industry: ‘One Step at a Time’

Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF –  Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”